Comprehensive developer toolkit providing reusable skills for Java/Spring Boot, TypeScript/NestJS/React/Next.js, Python, PHP, AWS CloudFormation, AI/RAG, DevOps, and more.
90
90%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Risky
Do not use without reviewing
Workflows and patterns for integrating SonarQube quality checks into the development lifecycle.
The recommended workflow for checking code quality before merging a pull request.
SonarQube analyzes PRs automatically when integrated with CI/CD. After CI runs, check the gate:
{
"name": "get_project_quality_gate_status",
"arguments": {
"projectKey": "my-service",
"pullRequest": "<pr-number>"
}
}If status: "OK" → safe to proceed with merge review.
If status: "ERROR":
conditions arraysearch_sonar_issues_in_projects filtered by PR to surface the specific issues{
"name": "search_sonar_issues_in_projects",
"arguments": {
"projects": ["my-service"],
"pullRequestId": "<pr-number>",
"severities": ["BLOCKER", "HIGH", "MEDIUM"],
"p": 1,
"ps": 100
}
}Group found issues by:
category: SECURITY) → highest prioritycategory: RELIABILITY) → bugs that affect behaviorcategory: MAINTAINABILITY) → code smellsPresent categorized summary to the developer before requesting changes.
After the developer pushes fixes, re-check the quality gate using the updated PR number or trigger a new analysis via CI.
Catch issues before they reach the CI pipeline using analyze_code_snippet.
language parameter for accuracyshow_rule to understand unfamiliar findingsTypeScript (SQL injection check):
{
"name": "analyze_code_snippet",
"arguments": {
"projectKey": "my-app",
"fileContent":"async function getUser(id: string) {\n const query = `SELECT * FROM users WHERE id = ${id}`;\n return db.execute(query);\n}",
"language": "typescript"
}
}Java (hardcoded credentials):
{
"name": "analyze_code_snippet",
"arguments": {
"projectKey": "my-java-app",
"fileContent":"public class DatabaseConfig {\n private static final String PASSWORD = \"myS3cr3t\";\n public Connection connect() { ... }\n}",
"language": "java"
}
}Python (deserialization risk):
{
"name": "analyze_code_snippet",
"arguments": {
"projectKey": "my-python-app",
"fileContent":"import pickle\n\ndef load_session(data):\n return pickle.loads(data)",
"language": "python"
}
}Go (error ignored):
{
"name": "analyze_code_snippet",
"arguments": {
"projectKey": "my-go-service",
"fileContent":"func readFile(path string) []byte {\n data, _ := os.ReadFile(path)\n return data\n}",
"language": "go"
}
}Systematic approach to clearing a backlog of Sonar issues.
Always start with BLOCKER issues, then CRITICAL/HIGH:
{
"name": "search_sonar_issues_in_projects",
"arguments": {
"projects": ["my-project"],
"severities": ["BLOCKER"],
"p": 1,
"ps": 100
}
}For each unfamiliar rule, retrieve documentation:
{
"name": "show_rule",
"arguments": {
"key": "java:S2068"
}
}Fix: Implement the recommended fix from rule documentation.
Accept (with reason):
{
"name": "change_sonar_issue_status",
"arguments": {
"key": "AY1234",
"status": "falsepositive",
"comment": "This pattern is safe because input is validated upstream at the API boundary."
}
}After fixes, check the project health:
{
"name": "get_component_measures",
"arguments": {
"projectKey": "my-project",
"metricKeys": ["bugs", "vulnerabilities", "code_smells", "security_rating", "reliability_rating"]
}
}For ongoing projects, establish a monitoring routine:
| Frequency | Check | Tool |
|---|---|---|
| Every PR | Quality gate status | get_project_quality_gate_status |
| Weekly | New BLOCKER/CRITICAL issues | search_sonar_issues_in_projects |
| Sprint review | Overall project health | get_component_measures |
| Before release | Full gate check on main | get_project_quality_gate_status |
When working on security-sensitive code (auth, payments, user data):
category: SECURITY issues regardless of severityFALSE-POSITIVE without team review{
"name": "search_sonar_issues_in_projects",
"arguments": {
"projects": ["my-service"],
"pullRequestId": "<pr-number>",
"p": 1,
"ps": 100
}
}Then filter the response for "category": "SECURITY" entries and review all of them, starting from BLOCKER.
When a quality gate fails on a PR:
conditions arraystatus: "OK"docs
plugins
developer-kit-ai
developer-kit-aws
agents
docs
skills
aws
aws-cli-beast
aws-cost-optimization
aws-drawio-architecture-diagrams
aws-sam-bootstrap
aws-cloudformation
aws-cloudformation-auto-scaling
aws-cloudformation-bedrock
aws-cloudformation-cloudfront
aws-cloudformation-cloudwatch
aws-cloudformation-dynamodb
aws-cloudformation-ec2
aws-cloudformation-ecs
aws-cloudformation-elasticache
references
aws-cloudformation-iam
references
aws-cloudformation-lambda
aws-cloudformation-rds
aws-cloudformation-s3
aws-cloudformation-security
aws-cloudformation-task-ecs-deploy-gh
aws-cloudformation-vpc
references
developer-kit-core
agents
commands
skills
developer-kit-devops
developer-kit-java
agents
commands
docs
skills
aws-lambda-java-integration
aws-rds-spring-boot-integration
aws-sdk-java-v2-bedrock
aws-sdk-java-v2-core
aws-sdk-java-v2-dynamodb
aws-sdk-java-v2-kms
aws-sdk-java-v2-lambda
aws-sdk-java-v2-messaging
aws-sdk-java-v2-rds
aws-sdk-java-v2-s3
aws-sdk-java-v2-secrets-manager
clean-architecture
graalvm-native-image
langchain4j-ai-services-patterns
references
langchain4j-mcp-server-patterns
references
langchain4j-rag-implementation-patterns
references
langchain4j-spring-boot-integration
langchain4j-testing-strategies
langchain4j-tool-function-calling-patterns
langchain4j-vector-stores-configuration
references
qdrant
references
spring-ai-mcp-server-patterns
spring-boot-actuator
spring-boot-cache
spring-boot-crud-patterns
spring-boot-dependency-injection
spring-boot-event-driven-patterns
spring-boot-openapi-documentation
spring-boot-project-creator
spring-boot-resilience4j
spring-boot-rest-api-standards
spring-boot-saga-pattern
spring-boot-security-jwt
assets
references
scripts
spring-boot-test-patterns
spring-data-jpa
references
spring-data-neo4j
references
unit-test-application-events
unit-test-bean-validation
unit-test-boundary-conditions
unit-test-caching
unit-test-config-properties
references
unit-test-controller-layer
unit-test-exception-handler
references
unit-test-json-serialization
unit-test-mapper-converter
references
unit-test-parameterized
unit-test-scheduled-async
references
unit-test-service-layer
references
unit-test-utility-methods
unit-test-wiremock-rest-api
references
developer-kit-php
developer-kit-project-management
developer-kit-python
developer-kit-specs
commands
docs
hooks
test-templates
tests
skills
developer-kit-tools
developer-kit-typescript
agents
docs
hooks
rules
skills
aws-cdk
aws-lambda-typescript-integration
better-auth
clean-architecture
drizzle-orm-patterns
dynamodb-toolbox-patterns
references
nestjs
nestjs-best-practices
nestjs-code-review
nestjs-drizzle-crud-generator
nextjs-app-router
nextjs-authentication
nextjs-code-review
nextjs-data-fetching
nextjs-deployment
nextjs-performance
nx-monorepo
react-code-review
react-patterns
shadcn-ui
tailwind-css-patterns
tailwind-design-system
references
turborepo-monorepo
typescript-docs
typescript-security-review
zod-validation-utilities
references
github-spec-kit